TYPE,NAME,INFOHASH,SIZEBYTES,MIRRORS,DOWNLOADERS,TIMESCOMPLETED,DATEADDED,DATEMODIFIED Dataset,"BU-Web-Client Network Traces",f305fe91840e1e117bdf27bd6c3970a69d90b92f,13786856,8,0,10138,1400273176,1599249391 Dataset,"LBL-CONN-7 Network Traces",2060d7faa61dd774f9279be7f3f79cece12ed0ed,15575483,9,0,5807,1400273567,1599249493 Dataset,"CrackStation's Password Cracking Dictionary (Human Passwords Only)",7ae809ccd7f0778328ab4b357e777040248b8c7f,257973006,9,0,4569,1407696582,1709161372 Dataset,"Internet Census 2012",7e138693170629fa7835d52798be18ab2fb847fe,611420520537,0,0,122,1408310247,1599201825 Dataset,"DNS Census 2013 - dataset of registered domains and DNS records",c89c9c891f7008e124e7382e605d04e3872e5541,15643996769,2,0,1437,1444868453,1599249643 Dataset,"CrackStation's Password Cracking Dictionary",fd62cc1d79f595cbe1de6356fb13c2165994e469,4500756826,4,0,1439,1521729061,1599249505 Dataset,""Pwned Passwords" Dataset",53555c69e3799d876159d7290ea60e56b35e36a9,11101449979,24,0,5442,1533335867,1599249253 Paper,"Effectiveness of Cybersecurity Competitions",30ec3bb79d95e4af3b92315a5a073fb10ec8a87d,318479,4,0,2283,1385350009,1385350009 Paper,"An Introduction to Computer Networks",958e2487d2db5f41f9c056bb35cf547edf38528f,4870326,9,0,11372,1422750897,1599249647 Course,"Internet History, Technology, and Security by Charles Severance",d666bf4b83066bcf7401e9c155fcd1b1c01cfb11,2349673820,14,0,14696,1521728797,1599249431